Think you have a false positive on this rule?

Sid 1-40363

Message

BROWSER-FIREFOX Mozilla Firefox CSP report-uri arbitrary file write attempt

Summary

The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.

Impact

CVSS base score 8.8 CVSS impact score 5.9 CVSS exploitability score 2.8 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2016-1954:

CVSS base score 8.8

CVSS impact score 5.9

CVSS exploitability score 2.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2016-1954: The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.

Affected systems

  • mozilla firefox 44.0.2
  • mozilla firefox_esr 38.0
  • mozilla firefox_esr 38.0.1
  • mozilla firefox_esr 38.0.5
  • mozilla firefox_esr 38.1.0
  • mozilla firefox_esr 38.1.1
  • mozilla firefox_esr 38.2.0
  • mozilla firefox_esr 38.2.1
  • mozilla firefox_esr 38.3.0
  • mozilla firefox_esr 38.4.0
  • mozilla firefox_esr 38.5.0
  • mozilla firefox_esr 38.5.1
  • mozilla firefox_esr 38.6.0
  • mozilla firefox_esr 38.6.1
  • mozilla thunderbird 38.6.0
  • novell susepackagehubforsuselinuxenterprise 12
  • novell leap 42.1
  • novell opensuse 13.1
  • novell opensuse 13.2
  • oracle linux 5.0
  • oracle linux 6.0
  • oracle linux 7.0

Ease of attack

CVE-2016-1954:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • www.mozilla.org/en-US/security/advisories/mfsa2016-17